March Special Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 713PS592

Note! The 156-115.80 Exam is no longer available.

156-115.80 Check Point Certified Security Master - R80 Questions and Answers

Questions 4

Which of the following is NOT a vpn debug command used for troubleshoot?

Options:

A.

fw ctl debug –m fw + conn drop vm crypt

B.

vpn debug trunc

C.

mpclient getdata sslvpn

D.

vpn debug on TDERROR_ALL_ALL=5

Buy Now
Questions 5

You issued the command “set ipv6-state on” in order to enable IPv6 protocol on a Security Gateway. The command was executed successfully. After reboot you notice that IPv6 protocol is not enabled. What do you do to permanently enable IPv6 protocol?

Options:

A.

Issue “set ipv6-state on” again; Save configuration and reboot

B.

You need to modify Gateway Properties in SmartConsole and install policy in order to enable IPv6

C.

You need to set “ipv6_state” parameter in $FWDIR/boot/modules/fwkern.conf and reboot

D.

You need to install a valid license to use IPv6 protocol

Buy Now
Questions 6

Which templates for SecureXL are not enabled by default?

Options:

A.

All templates are disabled by default

B.

Accept and NMR

C.

Drop and NAT

D.

All templates are enabled by default

Buy Now
Questions 7

What is the default and maximum number of entries in the ARP Cache Table in a Check Point appliance?

Options:

A.

1,024 and 4,096

B.

4,096 and 16,384

C.

4,096 and 65,536

D.

1,024 and 16,384

Buy Now
Questions 8

John works for ABC Corporation. They have enabled CoreXL on their firewall. John would like to identify the cores on which the SND runs and the cores on which the firewall instance is running. Which command should John run to view the CPU role allocation?

Options:

A.

fw ctl affinity –v

B.

fwaccel stat –l

C.

fw ctl affinity –l

D.

fw ctl cores

Buy Now
Questions 9

Which of the following would NOT be a flag when debugging a unified policy?

Options:

A.

rulebase

B.

clob

C.

connection

D.

tls

Buy Now
Questions 10

What file extension should be used with fw monitor to allow the output file to be imported and read in Wireshark?

Options:

A.

.cap

B.

.exe

C.

.tgz

D.

.pcap

Buy Now
Questions 11

What is enabled by the command “vpn debug mon”?

Options:

A.

statistics monitoring for vpn encrypted packets

B.

vpn daemon monitor mode

C.

ike monitor

D.

vpn debug mode

Buy Now
Questions 12

Which type of SecureXL templates is enabled by default on Security Gateways?

Options:

A.

Accept

B.

Drop

C.

NAT

D.

VPN

Buy Now
Questions 13

Where do Protocol parsers register themselves for IPS?

Options:

A.

Passive Streaming Library

B.

Other handlers register to Protocol parser

C.

Protections database

D.

Context Management Infrastructure

Buy Now
Questions 14

Which of the following is NOT a feature of ClusterXL?

Options:

A.

Transparent upgrades

B.

Zero downtime for mission-critical environments with State Synchronization

C.

Enhanced throughput in all ClusterXL modes (2 gateway cluster compared with 1 gateway)

D.

Transparent failover in case of device failures

Buy Now
Questions 15

What is the command to check the current status of hyper-threading?

Options:

A.

fw ctl get int cphwd_hyper_status

B.

fw ctl multik stat

C.

cat/proc/hyperstats

D.

cat/proc/smt_status

Buy Now
Questions 16

Which of the following is correct in a Threat Prevention policy?

Options:

A.

Threat Prevention inspects traffic to all objects specified in the Protected Scope

B.

Threat Prevention inspects traffic to and/or from all objects specified in the Protected Scope

C.

Threat Prevention is applied based on the profile. Protection Scope does not have any relevance

D.

Threat Prevention inspects traffic from all objects specified in the protected Scope

Buy Now
Questions 17

Which IPS command debug tool can you use for troubleshooting IPS traffic?

Options:

A.

ips debug traffic –o IPSdebug

B.

ips debug –f /var/log/IPSdebug.txt

C.

debug ips enable –o IPSdebug

D.

ips debug –o IPSdebug

Buy Now
Questions 18

How can you ensure that a particular service does not use the cluster IP address?

Options:

A.

Add the corresponding service port and IP protocol number into the “no_hide_services_ports” section of the table.def file

B.

Add the corresponding service port and IP protocol number into the “hide_services_ports” section of the table.def file

C.

Add the corresponding service port and IP protocol number into the “no_hide_services_ports” section of the user.def file

D.

Add the corresponding service port and IP protocol number into the “hide_services_ports” section of the user.def file

Buy Now
Questions 19

Your company’s site to site VPN tunnel has been established, however, some or all of the traffic is being dropped. Which one of the commands below could be used in troubleshooting the issue?

Options:

A.

fw ctl debug –p fw + conn pstat xlate xltrc nat

B.

fw ctl debug –m fw + conn drop ld xlate xltrc nat

C.

fw ctl debug –m fw + drop conn ltd xlate xltrc nat

D.

fw ctl debug –f fw + conns drop xlate net

Buy Now
Questions 20

Which of the following statements is TRUE about R80 management plug-ins?

Options:

A.

The plug-in is a package installed on the Security Gateway

B.

Installing a management plug-in requires a Snapshot, just like any upgrade process

C.

A management plug-in interacts with a Security Management Server to provide new features and support for new products

D.

Using a plug-in offers full central management only if special licensing is applied to specific features of the plug-in

Buy Now
Questions 21

Joey’s implementing a new R80.10 firewall cluster into the network. During the implementation he notices that the cluster object is in error state in SmartConsole. He tries to figure out the cause of the problem and runs a ClusterXL kernel debug with command: ‘fw ctl debug –m cluster + stat pnote conf ccp’

ClusterXL kernel debug shows him following info: fwha_set_new_local_state: Old version HA machines exist around so prevent state change to READY.

How can he solve the problem?

Options:

A.

cphaconf cluster_id set

B.

cphaprob mmagic

C.

Connect with GuiDBedit Tool to Security Management Server. Go to Table – Network Objects – network_objects. Select the relevant R80.10 Cluster object. Go to Search menu – Find – paste mac_magic. Right-click on the mac_magic the object – select Edit… and change the value to 254. Save changes and install policy.

D.

Connect with GuiDBedit Tool to Security Management Server. Go to Table – Network Objects – network_objects. Select the relevant R80.10 Cluster object. Go to Search menu – Find – paste cluster_magic. Right-click on the cluster_magic the object – select Edit… and change the value between 1 and 253. Save changes and install policy.

Buy Now
Questions 22

Which Check Point utility should be used to assist in analyzing the output of vpn and ike debug?

Options:

A.

cpview

B.

cpinfo

C.

ikeview

D.

vpnview

Buy Now
Questions 23

If you are experiencing performance issues on a gateway and you suspect it may be related to the interfaces, what command will assist in determining if packets are not being received into the gateway?

Options:

A.

netstat –rn

B.

show arp dynamic all

C.

ifconfig -a and look for RX drops

D.

ifconfig –a and look for TX drops

Buy Now
Exam Code: 156-115.80
Exam Name: Check Point Certified Security Master - R80
Last Update: Apr 14, 2023
Questions: 159